Show plain JSON{"affected_release": [{"advisory": "RHSA-2023:5046", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "flac-0:1.3.2-9.el8_8.1", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5042", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "flac-0:1.3.2-9.el8_1.1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5043", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "flac-0:1.3.2-9.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5043", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "flac-0:1.3.2-9.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5043", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "flac-0:1.3.2-9.el8_2.1", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5044", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "flac-0:1.3.2-9.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5044", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "flac-0:1.3.2-9.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5044", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "flac-0:1.3.2-9.el8_4.1", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5045", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "flac-0:1.3.2-9.el8_6.1", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5048", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "flac-0:1.3.3-10.el9_2.1", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-09-11T00:00:00Z"}, {"advisory": "RHSA-2023:5047", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "flac-0:1.3.3-9.el9_0.1", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-09-11T00:00:00Z"}], "bugzilla": {"description": "flac: Remote Code Execution (RCE) via the bitwriter_grow_ function, by supplying crafted input to the encoder", "id": "2235489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235489"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.8", "cvss3_scoring_vector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-120", "details": ["Buffer Overflow vulnerability in function bitwriter_grow_ in flac before 1.4.0 allows remote attackers to run arbitrary code via crafted input to the encoder.", "A flaw was found in the libeconf library. This issue occurs due to a buffer overflow vulnerability in the bitwriter_grow_ function in FLAC that allows remote attackers to run arbitrary code via crafted input to the encoder."], "mitigation": {"lang": "en:us", "value": "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."}, "name": "CVE-2020-22219", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "flac", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "flac", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "flac", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "flatpak-runtime-container", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "flatpak-sdk-container", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openshift:4", "fix_state": "Not affected", "package_name": "openshift4/network-tools-rhel8", "product_name": "Red Hat OpenShift Container Platform 4"}, {"cpe": "cpe:/a:redhat:openstack:17.0", "fix_state": "Not affected", "package_name": "flac", "product_name": "Red Hat OpenStack Platform 17.0"}, {"cpe": "cpe:/a:redhat:openstack:17.0", "fix_state": "Not affected", "package_name": "openstack-nova-libvirt-container", "product_name": "Red Hat OpenStack Platform 17.0"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "flac", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "flatpak-runtime-container", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "flatpak-sdk-container", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "mta-windup-addon-container", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "oadp-mustgather-container", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:17.1", "fix_state": "Not affected", "package_name": "openstack-nova-libvirt-container", "product_name": "Red Hat OpenStack Platform 17.1"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "flac", "product_name": "Red Hat OpenStack Platform 18.0"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "flatpak-runtime-container", "product_name": "Red Hat OpenStack Platform 18.0"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "flatpak-sdk-container", "product_name": "Red Hat OpenStack Platform 18.0"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "mta-windup-addon-container", "product_name": "Red Hat OpenStack Platform 18.0"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "oadp-mustgather-container", "product_name": "Red Hat OpenStack Platform 18.0"}, {"cpe": "cpe:/a:redhat:openstack:18.0", "fix_state": "Not affected", "package_name": "openstack-nova-libvirt-container", "product_name": "Red Hat OpenStack Platform 18.0"}], "public_date": "2023-08-22T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2020-22219\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-22219\nhttps://github.com/xiph/flac/issues/215\nhttps://github.com/xiph/flac/pull/419"], "statement": "This CVE marked as important as it can allow authenticated remote users to execute arbitrary code, or allow remote users to cause a denial of service.\nflac-1.3.0 in Red Hat Enterprise Linux 7 is not impacted. As it doesn't have the safe_realloc function, so not leaks memory.", "threat_severity": "Important"}